Sciweavers

53 search results - page 1 / 11
» crypto 2000
Sort
View
97
Voted
CRYPTO
2000
Springer
121views Cryptology» more  CRYPTO 2000»
15 years 5 months ago
CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions
John Black, Phillip Rogaway
82
Voted
CRYPTO
2000
Springer
99views Cryptology» more  CRYPTO 2000»
15 years 5 months ago
Timed Commitments
Dan Boneh, Moni Naor
71
Voted
CRYPTO
2000
Springer
81views Cryptology» more  CRYPTO 2000»
15 years 5 months ago
Optimistic Fair Secure Computation
Christian Cachin, Jan Camenisch
87
Voted
CRYPTO
2000
Springer
141views Cryptology» more  CRYPTO 2000»
15 years 4 months ago
Differential Fault Attacks on Elliptic Curve Cryptosystems
Ingrid Biehl, Bernd Meyer, Volker Müller
91
Voted
CRYPTO
2000
Springer
129views Cryptology» more  CRYPTO 2000»
15 years 5 months ago
Weaknesses in the SL2(IFs2) Hashing Scheme
Rainer Steinwandt, Markus Grassl, Willi Geiselmann...